How to Prevent the Next Attack in Healthcare using Cybersecurity

  • Check with publisher
  • Published date: March 8, 2018
    • Fremont, California, United States

Training Options Duration: 60 Minutes
Friday, May 11, 2018 | 10:00 AM PDT | 01:00 PM EDT

Overview: With the ever-changing landscape of cybersecurity, there are many threats, vulnerabilities, and malicious individuals trying to take down your network or get access to ePHI. With ePHI being the most valuable data on the dark web sometimes selling for over $100 per record, the bad people are targeting your organization.

We will first look at what are the different types of risk, threats, and vulnerabilities on ePHI and methods to keep your data secure. We will talk though topics such as why spectre and meltdown while not a problem today, could be the cause of the next big attack. Other attacks such as ransomware, phishing, social engineering, and insider attacks will discussed to help you better understand these threats and what you need to be doing to prevent them. In addition, we will take a brief look at medical device vulnerabilities and the importance of keeping those devices secure.

Vulnerability management will be discussed and how to use it as a valuable tool to keep your organization protected. If your IT department is not deploying patches and updates to your software and infrastructure it could end up be the cause of a breach or worse a ransomware attack.

Having an incident response plan will be critical to not only have, but to have tested so when you do experience a breach or potential attack you know what to do. In addition, we will look at the importance of having a Disaster Recovery / Business Continuity Plan and how it might be necessary to declare a disaster after an incident. After the webinar, you will have the insight to take your cybersecurity program to the next level.

Why should you Attend: New threats and vulnerabilities appear in the wild daily. Are you prepared if your network becomes infected? Do you understand what your IT department is doing to protect against these attacks? What about understanding the current threats to your organization?

After attending the webinar, you will have a much deeper understanding of why your organization and its data are attack targets and what the malicious individuals are after. With an understanding of the threats, you will be able to plan and prepare so you are ready when you are compromised.

Areas Covered in the Session:

Risks, threats, and vulnerabilities on ePHI
The confidentiality, integrity, availability (CIA) triad
Why you should be afraid of spectre and meltdown
Ransomware and what to do if infected
Social engineering and phishing
Insider attacks
Medical device vulnerabilities
Importance of patch management
Incident Response
Disaster Recovery / Business Continuity Planning
Tabletop exercises

Who Will Benefit:
Providers
Health Care Professionals
Compliance Officers
Business Associates
IT Professionals

Speaker Profile
Brian Freedman , MS, CISSP, PMP, CHCO has earned his Masters of Science in Information Systems and has over 20 years working in IT and Information Assurance. Mr. Freedman leverages deep project management and technical experience in order to lead key elements to several Health-Information Technology (IT), Privacy and Security initiatives.

Price - $139

Contact Info:
Netzealous - MentorHealth
Phone No: 1-800-385-1607
Fax: 302-288-6884
Email: support@mentorhealth.com
Website: http://www.mentorhealth.com/
Webinar Sponsorship: https://www.mentorhealth.com/control/webinar-sponsorship/
Registration Link : http://www.mentorhealth.com/control/w_product/~product_id=801231LIVE?science-marketplace_may_2018_SEO

Result 0 votes
Roger Steven
0 votes

Useful information

  • Avoid scams by acting locally or paying with PayPal
  • Never pay with Western Union, Moneygram or other anonymous payment services
  • Don't buy or sell outside of your country. Don't accept cashier cheques from outside your country
  • This site is never involved in any transaction, and does not handle payments, shipping, guarantee transactions, provide escrow services, or offer "buyer protection" or "seller certification"

Related listings

  • How to Put a Hipaa Compliance Program in Place

    How to Put a Hipaa Compliance Program in Place

    Medical - Health Fremont (California) March 8, 2018 Check with publisher

    Training Options Duration: 90 Minutes Wednesday, May 9, 2018 | 10:00 AM PDT | 01:00 PM EDT Overview: Being in compliance with HIPAA involves not only ensuring you provide the appropriate patient rights and controls on your uses and disclosures of pro...

  • Documentation Challenges in Behavioral Health

    Documentation Challenges in Behavioral Health

    Medical - Health Fremont (California) March 8, 2018 Check with publisher

    Training Options Duration: 90 Minutes Wednesday, May 9, 2018 | 10:00 AM PDT | 01:00 PM EDT Overview: This webinar will provide participants with an overview and in-depth examination of compelling documentation issues in behavioral health. Dr. Frederi...

  • Key Stark Law Considerations for Structuring and Auditing Medical Director Arrangements

    Key Stark Law Considerations for Structuring and Auditing Medical Director Arrangements

    Medical - Health Fremont (California) March 8, 2018 Check with publisher

    Training Options Duration: 60 Minutes Tuesday, May 1, 2018 | 10:00 AM PDT | 01:00 PM EDT Overview: In this session Mr. Wolfe will provide an overview of the Stark Law, including its recent changes. He will also discuss best practices for negotiating ...